infojet

Search resources:
Search Index



LINCDEC










Cisco Security List





























Data Backup Options:
Graphic



Data Backup Options Ref1 (MS Azure)

Table



Data Backup Options Ref2 (MS Azure)

Enterprise Data Backup Options (MS Azure)



GOOGLE SAFE SITE TEST



Small Biz Online Resources (to get business)

DH

GGL

GGLadmin

(google my business)

(google search console)

(Bing webmaster)

Bing Business

YP (almost not relevant

Yelp biz

twtr

fb

Instagm




Your IP address is___ 3.14.250.196 ___and your domain name is___ ec2-3-14-250-196.us-east-2.compute.amazonaws.com ___

IP_info









Seven Steps of Research Process

Celsius to Fahrenheit reference



0C___32F
5C___41F
10C__50F
15C__59F
20C__68F
25C__77F
30C__86F
35C__95F
40C__104F


100C=212F(boiling temp for H2O[water])


MIT(Google) Android App Inventor

MIT(GOOGLE) Android App inventor II







Where do I find People to Address and Address to People Finder websites? A list of People information and Property information websites is below:


123people.com (Alexa rank=9275)(results not very accurate, not displayed on website)
411.com (Alexa rank=9,243)
accurint.com (requires subscription, no ID info published)
AccuTellus.com
Acxiom.com(search facilities not obviously provided on website)
AddressSearch.com(not very accurate)
Ameridex.com(no direct search facilities)
Ancestry.com(takes a deal of work to obtain info, requires cash outlay for details)
Archives.com(no ID'ing info displayed after search, subscription required)
Aristotle.com(no free search facilities provided, subscription required for access)
Ark.com (currently invite only) (search people via social media profiles, does not provide a way to prevent from being searched or an opt-out method at the time of review (11/24/2012),account requires invite request and receipt of invite approval prior to given authority to search)
anywho.com ( phone book type entries displayed, no age or address provided, uses YP.com search results)
BackgroundReport360.com(search facilities on home page, results not accurate)
beenverified.com(search facilities on home page, accurate results displaying age, cities previously lived, relative full names)
birthdatabase.com (provides EXACT birth date (month/day/year), incredible; based on some preliminary research, the source of exact birth date appears to be linkedin and/or dating sites like match)
DirtyPhoneBook.com(not very accurate)
dobsearch.com(provides age via search facility but not exact birth date (mm/dd/yyyy)
dogpile.com (people search using the WhitePages tab on the search window and it publicly displays ID info from Intelius and USSearch)
Email Finder(provides search facilities on home page with ID'ing info (age, locations lived, relatives, etc.) free of charge)
Facebook friend finder (friend finder, displays brief summary of Facebook page via search facility; log in not required; FB not really a people data finder site; results only about FB pages)
facesaerch.com(displays pictures based on name or terms searched)
findanyone.com (Alexa rank=1,414.955)
FindPeople onPlus(website used to find people of Google+, only displays people on the Google+ network)
FreePhoneTracer(partially accurate results, accurate results require cash outlay)
freshaddress.com (e-mail address search, Alexa rank=526,123)
Google search (search your name via common Google search using your full name, city and state and see what shows up)
inforegistry.com (Alexa rank=575,515)
infospace.com (provides search function for people finder websites, this company is now known as BluCora)
InstantCheckMate(Alexa rank=3164) (ID'ing info (name, age, one full address and partial phone number) displayed if a record is found via search facilities provided on home page after agreeing to warning pop-up window)
instantpeoplefinder.com
intelius.com (Alexa rank=3513) (provides name, location and reverse phone # search facilities on website, accurate ID info provided publically includes age, relatives names, previous cities lived, other information provided for charge)
jigsaw.com (redirected to Salesforce data.com Contacts by Jigsaw)(Rank=4,575)
kgbpeople.com
knowx.com (no ID info publically displayed, for a fee provides info about business background such as bankruptcies, lawsuits, liens, judgements, etc. lexis site)
lexisnexis.com (Alexa rank=8,099)(need a subscription to access information, no personal information published on website, link provided to perform people search: Lexis people search resource page)
LinkedIn (this site does not display people's ages on site)(Alexa rank=12)
locateplus.com (ID info available via subscription, no ID info available via search facilities directly on website)
LookUp(provides accurate ID'ing info on site via search facilities available on home page; ID'ing info includes accurate age, relatives, previous cities as well as almost full e-mail address that you can easily figure out; now I know why I am being spammed so much on that e-mail address)
LookupAnyone(provides accurate ID'ing info (age, previous cities, relatives, no e-mail) on site charge free via search facilities on home page)
LookupExpert(provides limited but accurate ID'ing info (age, one location) via search facilities on home page)
merlindata.com (requires subscription, no ID info published on website, no search facilities provided on website directly, can provide full SSN via subscription service, popular with private investigators)
my.email.address.is (Alexa rank=520,955)(e-mail address search only)
my Free E-mail Search (Alexa Rank=643,543)
MyLife (Alexa rank=2168)(Facebook login or account creation required prior to provision of search facilities, no ID'ing information available without login)
MySpace people finder
NumberGuru(Reverse phone number look up via search facilities on home page, accurate but non ID'ing info displayed (carrier (Sprint) & location)
Peeepl(search facilities from home page result in general list of names but no ID'ing info; link to Spokeo provided)
peekyou.com (Alexa rank=4,435)
person.langenberg.com
peopledata.com
peoplefinders.com (4,454)
peoplelookup.com
peoplesearching.com (Alexa rank=586,910)
Peoplesearchnow.com(accurate ID'ing info (name, age, previous cities) displayed charge free on website using search facilities available on home page)
peoplesmart.com (Alexa rank=3257)(ID info provided on website (age, relatives, previous cities lived with partial address for all listings) free of charge via easily accessed search facilities)
phonesbook.com
PhoneDetective(partial info displayed free o charge via search facilities on home page, full info provided for fee)
pipl.com (Alexa rank=4084)(provides ID info via search facilities; multiple results from several people search providers are listed; exact age, address, relatives and previous cities lived provided free of charge)
plaxo.com (Alexa rank=7,314)
privateeye.com
PublicBackgroundChecks(displays accurate ID'ing info (name, age, cities lived, relatives) via search facilities on home page)
PublicRecords(displays accurate ID'ing info (name, age, cities lived, relatives) free of charge via search facilities on home page)
PublicRecordsNow(displays accurate ID'ing info (name, age, cities lived, relatives) free of charge via search facilities on home page)
radaris.com (not very accurate people search)
rapleaf.com (provides e-mail search functions; search facilities not available from home page; account creation (free) required prior to initiating searches)
reversenumberdatabase.com (provides phone number information via search facilities on home page; provides current comments on phone numbers below search facility)
reunion.com (Alexa rank=62,300, now part of MyLife.com)
searchbug.com (not very accurate which is good for private people)
skipease.com (uses peoplesmart.com search function for people, provides search facilities for multiple people finder websites)
spock.com (forwards to Zabasearch)
spoke.com
Spokeo.com (Alexa rank=1913) (provides ID info publicly via search facilities; age is estimated)
Squidoo person finder (list of people finder sites)
tlo.com (professional) (requires subscription, no ID info published on website, no web search facility provided, provides investigative facilities for public and private-proprietary records)
TopPeopleFinder(displays accurate ID'ing info (name, age, cities lived, relatives) free of charge via search facilities on home page; ad video plays automatically if you leave results on page for a few minutes)
usa-people-search.com (this one's opt-out policy (remove my info) is the worst type. They require you to send them a paper (yes, PAPER!) letter with a stamp to request to remove your information. Is that legal?) (Alexa Rank=50,208)
USIdentify(displays free of charge name, age and known locations (city,st) via home page search facilities)
USsearch.com (does not reveal age)
Verify.com(search facilities provided on home page, partially accurate (only age accurate) ID'ing information displayed charge free)
veromi.net(provides ID'ing info (your name, age and known locations) as well as the age of your possible relatives via search facilities from home page)
Waatp (provides US map of name of person searched, click map for detail, does not provide exact age but map of your living location is exact)
webmii.com
WestLaw People FinderNo ID info displayed without paying fee)
whowhere.com
whitepages.com (ADDRESS to People info. Can put in address of location and get information about people living or associated with that location. WHAT!?) (Alexa rank=785)
wink.com (Alexa rank=46,829)
xing.com (mostly in Europe)(Alexa rank=263)
Yahoo people search
yasni.com (Alexa rank=4,050)
yoname.com (Alexa rank=738.054, very little detail is revealed in the initial results, just name)
zabasearch.com (Alexa rank=26,185)
zoominfo.com (Alexa rank= 4,283 ,mostly business profile information)

Search the usenet database (old method)


The above list excludes foreign websites (which could number in the thousands or more). I did not wish to test these for concern I would be attacked by a epic array of viruses. Just be aware your information (SSN, credit card #s, bank account numbers, etc.) is likely available on these websites as well as those above.



People finder websites claim they obtain information from publicly accessible resources. To prevent your information from being displayed, you need to follow the non-publish/opt-out procedures for each website or use services that will do it for you for a fee. The non-publish or opt-out procedures often force you to send exact information (such as the month, day and year of your birth, photo copy or scanned driver's license) that the people finder websites may only have in fractional format. So, the process of opting out provides even more information to these companies or verifies the information they have as accurate and true which they may not have had prior to your opt-out request and increases its value for which they can sell it off to other affiliated and non-affiliated companies at a higher price (than non-verified information). Also and unfortunately, this removal process is not a not one-time event on your part as the people info publishing websites can easily apply their existing technology to a shiny new website name and/or phone app and again start publishing your information. You or a company you hire will have to contact this "new" company to remove your information. As you can easily figure out, this process (new website-app launched/your info published/you request to stop/they stop/transfer your info to a new company and start again) can keep going and going for a long time. The list above is not complete and is only accurate as of Nov. 2012. These websites may be helpful in performing background checks on individuals(such as a potential date or spouse, contractor, etc.). Famous people have a tough (almost impossible) challenge concealing their information from being publicly displayed as even sites such as Wikipedia and some search engines clearly publish their birth dates (m/d/y), spouse, children, locations lived, net worth and other information commonly available on people finder websites.

NOTE: Spokeo.com was fined $800,000 in June 2012 by the Federal Trade Commission (FTC) for violation of the Fair Credit Reporting Act (FCRA). Spokeo was fined for collecting details about people and selling it (to supposed potential employers) without protecting individual privacy.

INFOJET.org has no affiliations (direct or indirect) with any people finder websites listed above.

Info removal sites (partial list):
Reputation.com(fee charged to remove info from people finder sites, Expensive)(Infojet has no affiliation with Reputation.com)










See infojet.org on the following:










Radio stations (streaming): KRXQ(HardRock) KXPR(classic)

infojet.org_home page QR code(scan with mobile phone):



QR code generator


RGB color ref




JavaScript example:

Date and time onclick





GOOGLE Friendly Site STEPs (directly from GOOGLE (support.google.com))

GOOGLE Webmaster guidelines (directly from GOOGLE)



GOOGLE SEO and META viewport info
Google meta tag requirements

Google SEO very basic(meta description + title)

META viewport (to resize to fill any screen)fm Mozilla)


GOOGLE PageSpeed Insights (webpage / webapp test)
Google gives a score for your site and recommendations how to fix it.
Enter domain name or webpage to test:
/webroot/m/c/mccou002/ij/www/abt.php on line 312
">



Wordpress SEO FAQ(NOTE--Only do these things if you DO NOT have an SEO plugin installed like Yoast SEO or All-in-One SEO pack, etc. , it also only displays the title and description on the home main landing page): Where do I put meta description tag information in a WordPress site?( in the Settings/General-->Tagline field)

How do I get WordPress to display the meta description tag?(Enter your site/business Description in the Settings/General-->Tagline field and place a new meta description tag (with some php code -- php bloginfo('description') in the header.php file)



NOTE: Some hosting providers have a WordPress Settings panel (like Installatron used by Omnis) that allows you to enter your WP website Title and Tagline(Description) which gets transferred to the Site Title and Tagline fields in the Wordpress Admin panel automatically(enter your Site Title and Tagline in one place (Hosting provider WP settings panel OR directly in the WP admin panel (Settings/General[title of WP General menu option page is actually--General Settings]).

To get your WordPress site/main page to clearly display the meta Description tag for Google (as of early 2017), the WORDPRESS_org codex page linked above (titled: Meta Tags in WordPress) indicates that you NEED to enter this PHP line in the <head> section of the header.php file (Theme Header file). The header.php file is located in the WP Admin panel under Appearance(click),Editor(click), move eyes to the right side of the Editor page to view a list of files under Templates and click Theme Header (header.php) to open up the header.php file in the Edit Themes window. Enter the PHP meta description php bloginfo line shown above in the head section and click or press the Update File button. NOTE--This process will add ONE meta description for your WP site. WP plugins such as Yost SEO may allow you to customize the meta descriptions for multiple WP pages(I haven't tried the Yost SEO plugin. So, I don't know if this plugin works for customizing meta descriptions for multiple pages. I only read that it did a relatively good job for meta descriptions from some reviews.).





WPFast-- site fixes (remove top gray header bar and Powered by WordPress footer)
.site-header.float-header {
      background-color: transparent;
}

.site-header {
	background-color: #ffffff;
	position: relative;
}

.site-info { display: none; }










Other websites:


OmnisMgmt



dmnm_ck_EasyWhois(Captcha slows checks but no front-running)

INTERNIC.net (.com doman nm chk), fast but probable front running and auto-register bots)





DuckDuckGo(No Hstry) Search



How can I send a Verizon Text Message online with a browser? How can I check my Verizon Text Messages online with a browser?

Where is the Verizon Wireless Online Text Message Login?(Right Here)



Windows PowerShell CURL variable setup with target webpage/webapp

Windows PowerShell CURL get webpage/webapp




Windows PowerShell WGET .. like command to get web contents (Invoke-WebRequest)




Windows PowerShell, get list of files/links on webpage
PS H:\_lst> (Invoke-WebRequest -Uri infojet.org).Links

Windows PowerShell, get list of files/links on webpage and send to file
PS H:\_lst> (Invoke-WebRequest -Uri infojet.org).Links > weblincs.txt

wget -r (copies files recursively)


Make Ubuntu USB using Windows



Make Ubuntu USB using Ubuntu



Make Ubuntu USB using MacOS





Ubuntu USB maker(Rufus)

3 steps to make Ubuntu USB on Windows fast: (After opening Rufus in Admin mode)
/1/-Select destination USB
/2/-Select ISO
/3/-Select Start (leave everything else default)(Click Ok to the box about "Write in ISO image mode")



(You can also fix USBs that can't be accessed, formatted or viewed only as CD drives by formatting with Rufus)



Install Ubuntu Desktop



Boot option menu start Keys and BIOS/UEFI access keys for Computer manufacturers and custom board makers




List of Boot option menu start keys UEFI/BIOS start keys (by computer manufacturer, computer board manufacturer)



This document is an overview of the keys that allow you to display a list of startup devices and/or boot to a system BIOS/UEFI.(as of March 17, 2018)

ManufacturerModelsBoot Menu KeyBios Key
AcerAspire One zg5, zg8, Aspire TimelineF12F2
AcerAspire v3, v5, v7F12 ("F12 Boot Menu" must be enabled in BIOS)F2
Acer
Esc, F2, F12Del, F2



ManufacturerModelsBoot Menu KeyBios Key
ApplePost-2006 modelsOption
Apple Mac Startup Keys


ManufacturerModelsBoot Menu KeyBios Key
AsusDesktopsF8F9
AsusVivoBook f200ca, f202e, q200e, s200e, s400ca, s500ca, u38n, v500ca, v550ca, v551, x200ca, x202e, x550ca, z202eEscDelete
AsusN550JV, N750JV, N550LF, Rog g750jh, Rog g750jw, Rog g750jx Zenbook Infinity ux301, Infinity ux301la, Prime ux31a, Prime ux32vd, R509C, Taichi 21, Touch u500vz, Transformer Book TX300Esc (Disable "Fast Boot" and "Secure Boot Control")F2
Asusk25f, k35e, k34u, k35u, k43u, k46cb, k52f, k53e, k55a, k60ij, k70ab, k72f, k73e, k73s, k84l, k93sm, k93sv, k95vb, k501, k601, R503C, x32a, x35u, x54c, x61g, x64c, x64v, x75a, x83v, x83vb, x90, x93sv, x95gl, x101ch, x102ba, x200ca, x202e, x301a, x401a, x401u, x501a, x502c, x750jaF8Delete
AsusEee PC 1015, 1025cEscF2



ManufacturerModelsBoot Menu KeyBios Key
CompaqPresarioEsc, F9F10



ManufacturerModelsBoot Menu KeyBios Key
Dell
F12 (Select "USB Flash Drive")F2



ManufacturerModelsBoot Menu KeyBios Key
eMachines
F12tab, Delete



ManufacturerModelsBoot Menu KeyBios Key
Fujitsu
F12F2



ManufacturerModelsBoot Menu KeyBios Key
HP
Esc, F9Esc, F10, F1
HPPavilion Media Center a1477cEscF10
HPPavilion 23 All In OneEsc (Select boot media from the menu)F10
HPPavilion Elite e9000, e9120y, e9150t, e9220y, e9280tEsc, F9F10
HPPavilion g4, g6 and g7, Probook 4520s, 4525s, 4540s, 4545s, 5220m, 5310m, 5330m, 5660b, 5670bEscF10
HPPavilion HPE PC, h8-1287c, Pavilion PC, p6 2317c, Pavilion PC, p7 1297cb, TouchSmart 520 PC, ENVY x2, m4, m4-1015dx, m4-1115dx, sleekbook m6, m6-1105dx, m6-1205dx, m6-k015dx, m6-k025dx, touchsmart m7, Envy, dv6 and dv7 PC, dv9700, Spectre 14, Spectre 13, 2000 - 2a20nr, 2a53ca, 2b16nr, 2b89wm, 2c29wm, 2d29wmEsc (Then f9 for "Boot Menu")Esc
HP2000Esc (Then F9 for "Boot Menu". Select "Patriot Memory" on the Boot Option Menu)Esc
HPPavilion a410nEscF1



ManufacturerModelsBoot Menu KeyBios Key
Intel
F10



ManufacturerModelsBoot Menu KeyBios Key
LenovoDesktopsF12, F8, F10F1, F2
LenovoLaptopsF12F1, F2
LenovoThinkPad edge, e431, e531, e545, helix, l440, l540, s431, t440s, t540p, twist, w510, w520, w530, w540, x140, x220, x230, x240, X1 carbonF12F1
LenovoIdeaPad s300, u110, u310 Touch, u410, u510, y500, y510, yoga 11, yoga 13, z500Novo Button (Next to power button), F12Novo Button
LenovoIdeaPad P500F12 or Fn + F11F2
LenovoIdeaPad S10-3, g460, g470, g475, g480, g485F12F2



ManufacturerModelsBoot Menu KeyBios Key
MicrosoftSurface Pro 1-3
Volume-Down Button
MicrosoftSurface Pro 4 & Book
Volume-Up Button



ManufacturerModelsBoot Menu KeyBios Key
NEC
F5F2



ManufacturerModelsBoot Menu KeyBios KeyPackard Bell
F8F1, Delete


ManufacturerModelsBoot Menu KeyBios Key
Samsung
F12, EscF2, F10
SamsungNC10, np300e5c, np300e5e, np350v5c, np355v5c, np365e5c, np550p5cEscF2
SamsungSeries 5 Ultra, Series 7 Chronos, Series 9 UltrabookEsc (Must disable "Fast Boot" in BIOS)F2
SamsungAtiv Book 2, 8, 9F2 (Must disable "Fast Boot" in BIOS)F10



ManufacturerModelsBoot Menu KeyBios Key
Sharp

F2



ManufacturerModelsBoot Menu KeyBios Key
SonyVAIO Duo, Pro, Flip, Tap, FitAssist Button (Use the Assist Button when the computer is off, not when it is booting)Assist Button (Use the Assist Button when the computer is off, not when it is booting)
SonyVAIO, PCG, VGNF11F1, F2, F3
SonyVGNEsc, F10F2



ManufacturerModelsBoot Menu KeyBios Key
ToshibaKira, Kirabook 13, Ultrabook, Qosmio g30, g35, g40, g50, Qosmio x70, x75, x500, x505, x870, x875, x880F12F2
ToshibaProtege, Satellite, TecraF12F1, Esc
ToshibaEquiumF12F12



ManufacturerModelsBoot Menu KeyBios Key
ASUS
F8DEL
Gigabyte
F12DEL
MSI
F11DEL
Intel
F10F2
Asrock
F11F2
EVGA
F7DEL






HP computer Windows 10 support/schedule





Computer Start Menu--choose OS from list









NetCMDs--fast check
nslookup, tracert, ipconfig, netstat, ping, netsh, route print


sans JS site test
(Input dmn_nm only)











INFOJET HOME Page



Internic_net(Lookup domain names)



Top 25 software errors (mitre)







DHNET







DHNETml














Cybersecurity Preparation/Planning, Detection, Response, Recovery, Public Affairs and Legal Discussion Questions


Cyber Preparedness and Planning


1. Has your organization conducted a cyber risk assessment to identify organization specific threats and vulnerabilities?





a. What are your most significant threats (bad things from the outside like ransomware) and vulnerabilities (running obsolete/end of life software and hardware)?






b. What are your highest cyber security risks?







2. How does your organization integrate cybersecurity into the system development life cycle (i.e., design, procurement, installation, operation, and disposal)?





3. Discuss your supply chain concerns related to cybersecurity.





4. How do you communicate your cybersecurity concerns to your vendors and how do you evaluate their cybersecurity performance?






5. What role does organizational leadership play in cybersecurity? Does this role differ during steady-state and incident response?





6. What level of funding and/or resources are devoted to cyber preparedness?




Based on your risk assessment, what is the range of potential losses from a cyber incident?





7. Discuss cyber preparedness integration with your current all-hazards preparedness efforts.




Who are your cyber preparedness stakeholders (public, private, non-profit, other)?





8. What mission essential functions depend on information technology and what are the cascading effects of their disruption?




Have you had any external review or audit of your IT plans, policies, or procedures within the last year?



Are background checks conducted for IT, security and key supporting personnel?




Is there a manager/department in charge of cybersecurity management?




If yes, is this the primary function of that manager?





How does your organization recruit, develop, and retain cybersecurity staff?




How well-defined is cybersecurity in relation to contracts with third-party support vendors and crucial suppliers?





a. How often are contracts reviewed?




b. How well do your service level agreements address incident response?





Discuss the status of cyber preparedness planning within your organization.





a. Have you completed a business impact analysis?




Does the analysis include information technology (IT) infrastructure supporting mission essential functions identified in continuity of operations and continuity of government plans?




b. Is cybersecurity integrated in your business continuity plans?




Does your business continuity and/or disaster recovery planning have a prioritized list of information technology infrastructure for restoration?




c. How have IT specific plans been coordinated with other planning efforts such as an Emergency Operations Plan or Continuity of Operations Plan?




How is cybersecurity integrated into both organizational and project risk assessments and management?





Does your organization employ a formal sanctions process for personnel failing to comply with established information security policies and procedures?





If so, has this been communicated to employees?





Does your organization have a cybersecurity incident response plan?




When was it issued? When was the incident response plan last revised?




What authorities require which departments or agencies to follow the plan?




Does your organization utilize multi-factor authentication?




Does your IT department have a patch management plan in place?




If so, Are risk assessments performed on all servers on the network?




Are processes in place to proactively evaluate each server’s criticality and applicability to software patches?




Does this plan include a risk management strategy that addresses the following considerations?


The risks of not patching reported vulnerabilities?



Extended downtime?



Impaired functionality?



The loss of data?




Do you have a method for tracking and/or identifying problematic pieces of firmware in your organization, should a vulnerability be identified?




What processes does your organization have in place for when an employee is terminated or resigns?



a. Are there any additional processes that are implemented if the employee’s termination is contentious?




b. Does your organization retrieve all information system-related property (e.g., authentication key, system administration's handbook/manual, keys, identification cards, etc.) during the employment termination process?





Do any third-party vendors have unmitigated access into your network?




a. What protections do you have in place to protect against malicious intent by those vendors or outside parties that have access to your network?





What are your identified responsibilities for, and capabilities to, prevent cyber incidents?




Who is responsible for network and information security management?




Can you identify key documents that support cyber preparedness at a federal, state, or local level?




Does your organization follow a cybersecurity standard of practice (NIST Cybersecurity Framework/800 Series, ISO/IEC, etc.)?




If so, which?




Are there flowcharts showing the high-level relationships and crisis lines of communication (i.e., who calls who) specifically for a cyber incident?




Are they part of the response or continuity planning documents?




Does your organization have a formal or informal policy or procedures pertaining to IT account management?




a. Do these policies or procedures include protocols for establishing, activating, modifying, disabling, and removing accounts?




b. Do these policies or procedures include protocols/steps for notifying IT account managers/administrators when users are terminated?





Are IT and business continuity functions coordinated with physical security?




Are all three then collaborating with public relations, human resources, and legal departments?




Do you have processes to ensure that your external dependencies (contractors, power, water, etc.) are integrated into your security and continuity planning and programs?




Describe the decision-making process for protective actions in a cyber incident.





What options are available?





Have these options been documented in plans?





How are they activated?




What immediate protective and mitigation actions would be taken at your organization in this scenario?




Who is responsible for those actions?




What protective actions would you take across non-impacted systems or agencies in the scenario presented?




Who is responsible for protective action decision-making?




How are actions coordinated across parts of the organization?




Compare and contrast physical and cyber incident notifications and protective action decision-making.




What systems or processes are the most critical to running elections?





a. Is this decision codified in an incident response plan?




b. What processes are in place to run elections in the event computer systems are compromised (what backup systems do we have to maintain operations?)?







How do you protect the integrity of your voter registration database?



a. What entities have access to the database?



b. How would those entities report a breach of their systems to your office?




How do you protect the integrity of your voting equipment?



a. What entities have access to your voting equipment?



b. What entity is responsible for securing the voting equipment?




c. Does your organization maintain contact information with all relevant parties in case of an incident?




What is your planned cyber incident management structure?



a. Who (by department and position) leads incident management and why?



b. How are they notified?



c. When did they last exercise their role?



d. What is the length of your operational period (i.e., your “battle rhythm”)?




e. What are the primary and contingency communication mechanisms necessary to support incident management?






Information Sharing


Would your organization receive the information presented in the scenario?




a. Through what channels would this information be received and disseminated?




b. Are there established mechanisms to facilitate rapid information dissemination?




c. Are there known communication gaps?




If so, who in your organization is responsible for addressing those gaps?




d. What actions, if any, would your organization take based on this information?






What sources of cybersecurity threat intelligence does your organization receive?




For example, information from the Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), open source reporting, security service providers, others?





a. What cyber threat information is most useful?




b. Is the information you receive timely and actionable?




c. Who is responsible for collating information across the organization?






What mechanisms and products are used to share cyber threat information within your organization and external to your organization (e.g., distribution lists, information sharing portals)?




Describe how variables in threat information (timeframe, credibility, and specificity) impact decision-making.




How do local government entities report information to state partners?




What information, if any, would be shared between the local government IT offices, local election officials, and state officials?




a. How would this information be shared and is this process documented and/or formalized?




How is information shared among your internal and external stakeholders?




Through formal or informal relationships?




What information sharing mechanisms are in place?





What are some challenges that are experienced by information technology and business continuity planning in terms of information sharing?




Is information flowing in both directions?




Incident Identification


How do employees report suspected phishing attempts?




a. What actions does your department take when suspicious emails are reported?




b. Are there formal policies or plans that would be followed?




c. Does your department conduct phishing self-assessments?




Would any of these issues mentioned in the scenario be considered a cyber incident at this point?




What process does the general workforce follow to report suspected cyber incidents?




Is this a formal process on which they have been trained?




What would cause you or someone in your organization to report a cybersecurity incident?



a. How are incidents reported?




b. What would trigger the reporting requirements established by State law and policy?




c. Are cyber incident procedures documented in an incident response plan?




d. Who has the authority to create and enforce cybersecurity policies in your organization?




e. Are employees familiar with and have they received training on the plan?




Have you defined cybersecurity incident escalation criteria, notifications, activations, and/or courses of action?




a. If so, what actions would be taken at this point? By who?




b. Would leadership be notified?




How does your organization baseline network activity?




How would you be able to distinguish between normal and abnormal traffic?




Does the organization report cybersecurity incidents to outside organizations?




If so, to whom?




What, if any, mandatory reporting requirements do you have?




Do detection and analysis procedures differ for loss of personally identifiable information (PII), phishing attempts, data exfiltration, data modification, or other incidents?





Who is responsible for correlating information across different organizational-level incidents?




Discuss your organization’s intrusion detection capabilities and analytics that alert you to a cyber incident.




What type of hardware and/or software does your organization use to detect/prevent malicious activity of unknown origin on your systems/network?




What is your organization’s primary concern at this time?




What inject, if any, would prompt you or someone in your organization to report a cybersecurity incident?




a. How would reports flow between different levels of government (e.g., local reporting to state, or state to federal)?




Do you have someone within your organization who monitors the Dark Web?




If so, how would you verify the security researcher’s claims and confirm authenticity of the sensitive information in question?





Incident Response


What level of leadership/management would be notified at this point in the scenario?




Is there a plan in place detailing the thresholds at which different notifications are made and what information is provided?




What is your department or agency’s primary concern?




Mitigation of the incident (resolving the issue) or investigation (preserving the evidence to build a criminal case)?



Who would make this decision?




Are these mutually exclusive?







What response actions would your organization have taken at this point?




Are these actions driven by a plan?




What impact will the sale of sensitive or Personally Identifiable Information (PII) have on your response and recovery activities?




a. Will it alter priorities?




Have your public relations priorities changed?





b. Will it trigger any additional legal or regulatory notifications?







Whom will you notify, internally and externally, of these incidents?




a. Is there a process or plan in place that outlines the severity thresholds for which different notifications are made and what information is to be conveyed?




b. Are you keeping senior leadership updated?




What information is provided and how is it communicated?



c. Would you make any notification to the public?



i. If so, how are you coordinating your messaging within your organization?




ii. Do you have pre-canned messaging or holding statements for such an event?




d. How are you ensuring unity of message between your organization, the public sector, and elected officials?





How would these events affect your organization’s business operation/processes?




Do these incidents generate any concerns that have not been addressed?




How would your organization respond to the discovery of a malicious, unauthorized administrator account on your systems?




Who would be informed internally?




Who would be informed externally (e.g., law enforcement, cybersecurity insurance partners, etc.)?




What resources are required for incident investigation and attribution?




Are sufficient resources available in-house?




Would the events presented in the scenario trigger activation of your cyber incident response plan or similar document (e.g., emergency operations plan cyber incident annex)?




If so, would that alter any roles and responsibilities?




At what point in the scenario would you contact law enforcement and/or the state Attorney General?




a. How would relationships with law enforcement and other partners be managed?




Where is the process documented?




b. How does a law enforcement investigation impact containment, eradication, and recovery efforts?




c. Are processes and resources in place for evidence preservation and collection?





Discuss the difference between network and host forensics.




How are you equipped and staffed to address this?




Do you have a network operations center?




Security operations center?




What are their roles during a response?




What are your essential elements of information and key information questions necessary for operational and executive-level responses to cyber incidents?





What mission essential functions are impacted by the incidents described in the scenario?







Is there a way to maintain service availability of key assets (e.g., network connectivity, etc.) (maintain operations in all conditions)?





What capabilities and resources are required for responding to this series of incidents?





a. What internal resources do you depend on?




Are your current resources sufficient?




b. Whom do you contact if you’re in need of additional third-party assistance?




c. What resources are available within the state or locally?




How do you request these resources?



d. Do you have personnel tasked with incident response or a designated cyber incident response team within your organization?





i. If so, what threshold must be reached for the cyber incident response personnel to be activated?




Does this scenario reach that threshold?




ii. Who is responsible for activating the cyber incident response personnel and under what circumstances?




iii. What are the cyber incident response team/personnel’s roles and responsibilities?









Does this scenario exceed your organization’s ability to respond?




a. If so, are there established procedures to request additional support?




What are your organization’s response priorities?




a. Who would be notified at this point in the scenario?




Is there a plan in place detailing the thresholds at which different notifications are made and what information is provided?




b. What response actions would the IT/IS department take at this point?




Are these actions driven by a plan?





c. What response capabilities and resources are required to respond to these incidents?






What actions would be taken when the exfiltration is discovered?





Does your organization have written plans that would be implemented?






What is the decision process to determine if the ransom should be paid or not?





a. Who decides?




b. What’s the process?




c. What are the advantages/disadvantages?




d. What are the political ramifications?




e. What outside partners/entities do you need to contact?







Where do you receive cyber response technical assistance?




Do you have plans, procedures or policies in place to access this assistance?




Have you proactively identified and established the service provider relationships needed for incident/breach response issues (e.g., credit counseling, forensic/computer security services)?





What processes are used to contact critical personnel at any time, day or night?




a. How do you proceed if critical personnel are unreachable or unavailable?





If your pollbook or other critical election information system were disabled how would you continue elections operations?





a. What, if any, additional resources would you need to conduct elections if your elections information was unrecoverable?





b. Do you have mechanisms in place (e.g., MOU/MOA, contract, etc.) for arranging additional surge support of both personnel and resources on Election Day, should it be needed?





How would your organization respond to misprinted ballots?




How would a breach of another agency affect your entity if they potentially have access to your information?





a. Is the agency required to notify your entity of their breach or suspected breach?




If so, what are the notice requirements (ProConnect tax online data breach)?






Given the events of election day voting what is your greatest priority?




If the networks were found to be infected with ransomware, how would this impact the certification of election results?




a. If election results from your entity cannot be certified, how would you proceed?





How would voters locate their polling location if the locator were vandalized or disabled?




How would you determine whether unauthorized manipulation of election data has occurred?



a. How would you address the absence or alteration of voter data in the pollbooks?




b. How would you reconcile a greater number of voter versus available voters registered?




How would you respond to the allegations that the election data results were damaged or destroyed?



a. What partners would you involve in the response?




b. Have you drafted messaging in advance of an incident?




If primary communications are compromised, how do you provide information to internal and external entities?




What actions, if any, would you take based on the ballot addresses being incomplete or ballots being mailed to voters who have moved?




How would you handle the misprinted ballots?




How are voters able to vote in the event the voter registration database is compromised?




In the event of complete failure of your entity’s general network or election network, what systems would you need to successfully run an election (backup system to maintain operations)?




How would you respond to the attempts to discredit the elections process on social media?





Recovery

When does your organization determine a cyber incident is closed?





a. Who makes this decision?




b. Would your organization engage in any post-incident activities?






What actions would your organization take if your IT/incident response staff could not confirm the integrity of your systems/data?




a. Would senior leaders consider re-activating critical business processes and

systems?





What is the risk associated with doing so?




b. Would your organization consider a complete rebuild of these systems?




How long and costly would that process be?




c. What factors do you consider when making these decisions?




What formal policies and procedures does your organization use to decide when and how to restore backed-up data, including measures for ensuring the integrity of backed-up data before restoration?






Does your organization have back-ups of vital records (e.g., the voter registration database, etc.) in a location that is separated from your primary working copies of your files?





a. How frequently do you run backups?




b. How long do you keep any copies of archived files backed up?




c. How long of a downtime would exist between your primary files and the restoration of files via your back-up?




Are redundant systems in place if the impacted system(s) is compromised?



a. Are alternative systems or manual processes in place to continue operations if a critical system is unavailable for a significant period of time?




b. Who can authorize use of alternate systems or procedures?





What backup systems are utilized by participants?




a. How quickly can they be deployed?




b. How often are backups created or destroyed?




Describe your role in post-incident activity.




How would you work with critical infrastructure providers to determine the incident is over?




How does post incident-activity differ when critical infrastructure is involved?




Does your organization have a continuity of operations plan (COOP) for conducting its functions at a location other than your main building?




a. If so, how would a suspected cyber incursion impact your organization’s ability to activate its COOP Plan?





Are there further concerns that have not be discussed?






Training and Exercises

1. Does your organization provide basic cybersecurity and/or IT security awareness training to all users (including managers and senior executives)?




a. How often is training provided?



b. Does it cover:



i. Review of department and/or agency acceptable use and IT policies,



ii. Prominent cyber threat awareness,



iii. Password procedures, and



iv. Whom to contact and how to report suspicious activities?




c. Is training required to obtain network access?



d. What security-related training does your department or agency provide to, or contractually require of, IT personnel and vendors with access to your city’s or county’s information systems?




How often do they receive the training?




2. Do you regularly train elections personnel, including volunteers, on cybersecurity threats such as phishing?




a. Does your organization provide basic cybersecurity and/or IT security awareness training to all users (including managers, senior executives, and vendors)?




b. How often is training provided?




c. What topics are covered in the training sessions?






3. Do your cybersecurity incident response team members undergo any special training to detect, analyze, and report this activity?




If so, can you describe this training?




a. Is your staff sufficiently trained to read and analyze your intrusion detection system logs?




4. What training do you provide in support of your Cybersecurity Incident Response Plan, Business Continuity Plan, Emergency Operations Plan Cyber Incident Plan, or other related plans?





a. Do employees know what constitutes suspicious cybersecurity activities or incidents?




Do they know what actions to take when one arises?




5. If you have a cyber incident response plan, how often does your organization exercise the plan?



a. Who is responsible for the exercise planning?




b. What agencies are involved in the exercise?




c. What level of the organization is required to participate?




d. What actions follow the exercise?





6. What are your cybersecurity incident response team’s exercise requirements?




7. Do your organization’s exercise efforts include both physical and cyber risks?



8. Have senior or elected officials participated in a cybersecurity exercise?



9. Are there additional training and/or exercising requirements for your organization?





Senior Leaders and Elected Officials

What is your cybersecurity culture?





As a leader in your organization, what cybersecurity goals have you set?




How have they been communicated?





As it relates to your jurisdiction, what cybersecurity information do you request?





What do you receive?




What are your cybersecurity risks?





Who develops your jurisdiction’s cybersecurity risk profile?




What are their reporting requirements?




Are they directed to, required by statute, or other?




How often do they report?





Is your cybersecurity risk integrated with physical risk for an integrated jurisdictional risk assessment?




What is your jurisdiction’s greatest cybersecurity concern?




Why do you rate this concern as your greatest concern?




Who reports to you on cyber threats?




What, if any, infrastructure does your jurisdiction own, operate, and/or regulate?




What relationships do you have with critical infrastructure owners and operators?




What priorities have you set related to the cybersecurity of critical infrastructure?




What is your most important critical infrastructure?




What are your regulatory requirements related to critical infrastructure, if any?




What is the greatest threat facing your critical infrastructure?




What, if anything, is your jurisdiction able to do to mitigate it?




When did you last receive a cyber threat briefing for your jurisdiction?




How has your jurisdiction prepared for a cyber incident?




Does your jurisdiction have cybersecurity plans in place?




How many information security officers do you have?




Does the plan indicate how they will work together?




Have your information security officers and emergency managers jointly planned for cybersecurity incidents?




What are your cybersecurity workforce gaps?





How does your jurisdiction recruit, develop, and retain cybersecurity staff?





What cybersecurity training do you have planned for cybersecurity staff, managers, and general workforce?




What magnitude of incident would require you be notified?




How does that notification process work?




Is it planned?




What requirements or agreements, if any, exist for critical infrastructure to notify you of a cyber incident?




Who advises you on cyber threats?



What are your essential elements of information or critical information requirements?




What is your planned role in protective action decision-making?




What is your planned cyber incident management structure?




What parts of the government need to be engaged?




Would your jurisdiction’s Emergency Operations Center be activated in a cyber incident?



How?




Why?





What is your role in a cyber incident?






How does a law enforcement investigation impact your response?




What is your role in communicating to the public?




How are costs of the response calculated?




What information do you need to support your decision-making process?




Who is your jurisdiction’s cybersecurity liaison to privately-owned and operated critical infrastructure?




What are your expectations of the State and Federal Government?




Describe your role in post-incident activity.




What is your role in restoring and/or maintaining public confidence?





Public Affairs

What are your public affairs concerns?




Who is responsible for coordinating the public message?




Is this process a part of any established plan?




a. How would your department respond to the local media reports?




b. What information are you sharing with citizens?




Employees?




c. Are public information personnel trained to manage messaging related to cyber incidents?




d. Does your department have pre-drafted statements in place to respond to media outlets?




e. Are they trained to manage your social media presence?




f. Are all personnel trained to report any contact with the media to appropriate public information personnel?




What information would your organization communicate to the public?




How would you communicate it?




Who is responsible for public information related to the incident?



What training or preparation have they received?




How would your organization respond to the attempts at disinformation/misinformation concerning elections?




a. Does your organization have established public messaging processes as part of a larger communications plan?




b. How would your organization respond to the social media posts/rumors and local media reports?



Would you use social media or respond by drafting statements?




c. What message are you sending employees?




d. Are personnel trained to report any contact with the media to the appropriate public information personnel?




How would you inform other entities of the fake websites and social media pages?




a. How would you contact social media platforms?




b. What issues or challenges have you had in working with them?




How would your organization respond to the emerging news and social media issues?




a. Does your organization have pre-approved messages for immediate release as part of a larger communications plan?




What steps are you taking before an incident to build relationships with the media and with voters before an incident happens?





Legal

What are the legal issues you must address?






What policies should your organization have?






Does it exercise these policies?




If so, how often?




What legal documents should your organization have in place (for example with third-party vendors)?





What is the role of the legal department in this scenario?





Does your state have security breach notification laws?




If so, what do they include?







What are the consequences if you are unable to certify the official election results?






What processes are in place to collect evidence and maintain the chain of custody?







Cybersecurity evolution should eventually lead to a zero-trust environment where devices, services and people will be required to continually request access to critical systems and data. Unless otherwise stated, all access is denied by default in a zero trust environment.

See the US National Security Agency's overview of a Zero-Trust environment


NSA Zero-Trust Model







As technology continues to evolve, cyber threats continue to grow in sophistication and complexity. Cyber threats affect businesses of all sizes and require the attention and involvement of chief executive officers (CEOs) and other senior leaders. To help companies understand their risks and prepare for cyber threats, CEOs should discuss key cybersecurity risk management topics with their leadership and implement cybersecurity best practices. The best practices listed in this document have been compiled from lessons learned from incident response activities and managing cyber risk.

What should CEOs know about the cybersecurity threats their companies face?

CEOs should ask the following questions about potential cybersecurity threats:

What can CEOs do to mitigate cybersecurity threats?

The following questions will help CEOs guide discussions about their cybersecurity risk with management:

Recommended Organizational Cybersecurity Best Practices

The cybersecurity best practices listed below can help organizations manage cybersecurity risks.

Refer to the Cybersecurity and Infrastructure Security Agency (CISA) Cyber Essentials page for recommendations on managing cybersecurity risks for small businesses.







US Small Business Administration Cybersecurity Advice

CyberReadiness Institute (includes incident response template and other pre-made policies)



FCC Cyberplanner (includes Incident Response Guide tempplate



Cybersecure My Business



CISA Cyber Essentials checklist document







Fast CyberSecurity 3-step Checklist:

___ (1)(Administrative) Policies/Agreements/Traiing(Strictly enforced Acceptable Use, Data security and Data Confidentiality policies, cyber insurance policy?), Terms of Service (TOS) Review (cloud provider terms of service) (FCC Cyber Planner (small business automated policy generator)), Annually evaluate system effectiveness and create a schedulted fix-it list with solutions (Plan of Actions and Milestones, POA&M)

(Fast Policy--Daily): I agree, on a daily basis, to securely access (via MFA and VPN), manage and safeguard customer data using only company approved and secured devices and services.(Staff presses approval button to access company systems)


___ (2)(Technical/Physical) (Firewall, Anti-malware, Automated Security, Backups, Automated Data Encryption(when stored and in motion), Multi-factor authentication (MFA), VPN, Automated Device and Service Updates, Inventory ALL Devices, Services and People accessing data. Secure ALL Devices, Services and People(via policy agreement) managing data. Traveler's Insurance CyberSecurity Network Assessment

___ (3) (Incident Response Readiness) Analysis and Plans: Business Impact Analysis (What are our most important data and systems?) --> Incident Response Plan (immediate actions to isolate problem, gather information and report incident to IRS, SEC, FBI, cyberinsurance carrier if required) and Disaster Recovery Plan (activate backup systems to maintain business continuity)

Practice your Incident Response and Disaster Recovery Plans before you need to run them for real during a live incident.

                        


                                                                                                                                                 Activate Disaster Recovery Plan --> Return to Stable Business Operations
                                                                                                                                                 /
Incident                                                                                                                                    /
           \
            Activate Incident Response Plan --> Stop the problem (FTC Data Breach Response Guide)



(The Ultimate question you need to answer about safeguarding customer data)

When operating your business, always consider if your customer data is continually secured from unauthorized access, exposure, alteration and/or use no matter where, when or how it is being used.







I am too busy to do all this stuff. What are the basics that I need to safeguard customer data from unauthorized access, exposure, alteration and use?

To Safeguard data SuperFast, implement:

VPN (all Devices)
MFA (all Devices and Services)
Automated Security (integrated firewall/anti-malware/anti-ransomware) (all Devices and Services)
Automated Encryption(all Devices and Services)
Automated Updates(all Devices and Services)
Automated Backups (all Devices, Data and Services)
Replace network devices every 3-years, computing devices every 5-years, clear data from devices before physically destroying devices with a hammer
Daily data security policy agreement and annual training (Staff)
(Fast Daily Data Security Policy): I agree, on a daily basis, to securely access (via MFA and VPN), manage and safeguard customer data using only company approved and secured devices and services.(Staff presses approval button to access company systems)

Designate yourself as information security program coordinator.

Data Incident Response entities to contact:
IRS

FBI

Secret Service

Cyber Insurance carrier

Incident Response Plan(be ready before you need it)-activate
(1)turn off infected computer, (2) isolate problem Disaster Recovery (deploy automated backup system, add additional security services to prevent future incidents)


















Remove a program/application/extension/service from Windows 10 that is NOT showing up in Apps & Featues list or in Control Panel / Programs and Features / Uninstall or Change a Program list:

If there is no uninstaller to remove "Program Name Here" in the Control Panel follow the instructions below:

1. Open a Command Prompt on your computer (Run -> CMD)
2. Run CMD as an administrator
3. Type WMIC, hit enter
4. Type product where name="Program Name you want to Uninstall Here, such as Workspace" call uninstall
5. Then type y (yes)
6. Should return value of "0"